- ID de l'analyse :
- 714fc2fe-e4ac-42d2-b93b-39b016ef31b3Terminée
- URL soumise :
- https://haveibeenpwned.com/
- Fin du rapport :
Transactions HTTP · 43 détectées
Une liste de toutes les requêtes et réponses HTTP émises par la ressource au cours de la session en cours
Méthode | URL | Statut | Protocole | Type | Taille |
---|---|---|---|---|---|
GET | https://haveibeenpwned.com/ | 200 | h2 | text/html | 31.62kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css | 200 | h2 | text/css | 121.2kB |
GET | https://haveibeenpwned.com/content/css/pwned?v=l-PSrblX7vf9eicCwy8GIKZZEgr2tgWv8vdHZNKZii81 | 200 | h2 | text/css | 24.5kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css | 200 | h2 | text/css | 31kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/1PasswordLogo.svg | 200 | h2 | image/svg+xml | 9.83kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step1.png | 200 | h2 | image/webp | 9.34kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step2.png | 200 | h2 | image/webp | 2.59kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step3.png | 200 | h2 | image/webp | 3.29kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js | 200 | h2 | application/javascript | 85.58kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js | 200 | h2 | application/javascript | 37.05kB |
Enregistrements DNS : 4 trouvé(s)
Les enregistrements DNS fournissent des informations concernant un domaine, notamment l'adresse IP à laquelle il est associé
Type | Nom | Contenu | DNSSEC |
---|---|---|---|
A | haveibeenpwned.com | 104.16.124.33 | Activé |
A | haveibeenpwned.com | 104.16.123.33 | Activé |
AAAA | haveibeenpwned.com | 2606:4700::6810:7b21 | Activé |
AAAA | haveibeenpwned.com | 2606:4700::6810:7c21 | Activé |